共查询到20条相似文献,搜索用时 437 毫秒
1.
In this paper, we investigate the impact of team size on the software development effort. Using field data of over 200 software
projects from various industries, we empirically test the impact of team size and other variables—such as software size in
function points, ICASE tool and programming language type—on software development effort. Our results indicate that software
size in function points significantly impacts the software development effort. The two-way interactions between function points
and use of ICASE tool, and function points and language type are significant as well. Additionally, the interactions between
team size and programming language type, and team size and use of ICASE tool were all significant.
相似文献
2.
We have built a mobile robotic platform that features an Active Robotic Head (ARH) with two high-resolution cameras that can
be switched during robot operation between two configurations that produce respectively panoramic and stereoscopic images.
Image disparity is used for improving the quality of the texture. The robot head switches dynamically, based on robot operation
between the stereoscopic configuration and the panoramic configuration.
相似文献
3.
We document the influence on programming language semantics of the Platonism/formalism divide in the philosophy of mathematics.
相似文献
4.
Japan has more robots than any other country with robots contributing to many areas of society, including manufacturing, healthcare,
and entertainment. However, few studies have examined Japanese attitudes toward robots, and none has used implicit measures.
This study compares attitudes among the faculty of a US and a Japanese university. Although the Japanese faculty reported
many more experiences with robots, implicit measures indicated both faculties had more pleasant associations with humans.
In addition, although the US faculty reported people were more threatening than robots, implicit measures indicated both faculties
associated weapons more strongly with robots than with humans. Despite the media’s hype about Japan’s robot ‘craze,’ response
similarities suggest factors other than attitude better explain robot adoption. These include differences in history and religion,
personal and human identity, economic structure, professional specialization, and government policy. Japanese robotics offers
a unique reference from which other nations may learn.
相似文献
5.
We outline an approach for extending procedural finite-element software components using generic programming. A layer of generic
software components consisting of C++ containers and algorithms is used for parallelization of the finite-element solver and
for solver coupling in multi-physics applications. The advantages of generic programming in connection with finite-element
codes are discussed and compared with those of object-oriented programming. The use of the proposed generic programming techniques
is demonstrated in a tutorial fashion through basic illustrative examples as well as code excerpts from a large-scale finite-element
program for serial and parallel computing platforms.
相似文献
6.
Up to now, walking robots have been working outdoors under favorable conditions and using very large stability margins to
cope with natural environments and intrinsic robot dynamics that can cause instability in these machines when they use statically-stable
gaits. The result has been very slow robots prone to tumble down in the presence of perturbations. This paper proposes a novel
gait-adaptation method based on the maximization of the Normalized Dynamic Energy Stability Margin. This method enables walking-machine
gaits to adapt to internal (robot dynamics) and external (environmental) perturbations, including the slope of the terrain,
by finding the gait parameters that maximize robot stability. The adaptation method is inspired in the natural gait adaptation
carried out by humans and animals to balance external forces or the effect of sloping terrain. Experiments with the SILO4
quadruped robot are presented and show how robot stability is more robust when the proposed approach is used for different
external forces and sloping terrains. Using the proposed gait-adaptation approach the robot is able to withstand external
forces up to 58% the robot weight and 25-degree slopes.
相似文献
7.
The paper reflects on the unique experience of social and technological development in Lithuania since the regaining of independence
as a newly reshaped society constructing a distinctive competitive IST-based model at global level. This has presented Lithuanian
pattern of how to integrate different experiences and relations between generations in implementing complex information society
approaches. The resulting programme in general is linked to the Lisbon objectives of the European Union. The experience of
transitional countries in Europe, each different but facing some common problems, may be useful to developing countries in
Africa.
相似文献
8.
This paper describes the simulated car racing competition that was arranged as part of the 2007 IEEE Congress on Evolutionary
Computation. Both the game that was used as the domain for the competition, the controllers submitted as entries to the competition
and its results are presented. With this paper, we hope to provide some insight into the efficacy of various computational
intelligence methods on a well-defined game task, as well as an example of one way of running a competition. In the process,
we provide a set of reference results for those who wish to use the simplerace game to benchmark their own algorithms. The paper is co-authored by the organizers and participants of the competition.
相似文献
9.
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components
(including human components). These trust assumptions, whether implicit or explicit, affect the scope of the analysis, derivation
of security requirements, and in some cases how functionality is realized. This paper presents trust assumptions in the context
of analysis of security requirements. A running example shows how trust assumptions can be used by a requirements engineer
to help define and limit the scope of analysis and to document the decisions made during the process. The paper concludes
with a case study examining the impact of trust assumptions on software that uses the secure electronic transaction specification.
相似文献
11.
This paper addresses the possibility of measuring perceived usability in an absolute way. It studies the impact of the nature
of the tasks performed in perceived software usability evaluation, using for this purpose the subjective evaluation of an
application’s performance via the Software Usability Measurement Inventory (SUMI). The paper reports on the post-hoc analysis
of data from a productivity study for testing the effect of changes in the graphical user interface (GUI) of a market leading
drafting application. Even though one would expect similar evaluations of an application’s usability for same releases, the
analysis reveals that the output of this subjective appreciation is context sensitive and therefore mediated by the research
design. Our study unmasked a significant interaction between the nature of the tasks used for the usability evaluation and
how users evaluate the performance of this application. This interaction challenges the concept of absolute benchmarking in
subjective usability evaluation, as some software evaluation methods aspire to provide, since subjective measurement of software
quality will be affected most likely by the nature of the testing materials used for the evaluation.
相似文献
12.
We present a study of using camera-phones and visual-tags to access mobile services. Firstly, a user-experience study is described in which participants were both observed learning to interact with a prototype mobile service and interviewed
about their experiences. Secondly, a pointing-device task is presented in which quantitative data was gathered regarding the speed and accuracy with which participants aimed and clicked
on visual-tags using camera-phones. We found that participants’ attitudes to visual-tag-based applications were broadly positive,
although they had several important reservations about camera-phone technology more generally. Data from our pointing-device
task demonstrated that novice users were able to aim and click on visual-tags quickly (well under 3 s per pointing-device
trial on average) and accurately (almost all meeting our defined speed/accuracy tradeoff of 6% error-rate). Based on our findings,
design lessons for camera-phone and visual-tag applications are presented.
相似文献
13.
Quantitative usability requirements are a critical but challenging, and hence an often neglected aspect of a usability engineering process. A case study is described where quantitative usability requirements played a key role in the development of a new user interface of a mobile phone. Within the practical constraints of the project, existing methods for determining usability requirements and evaluating the extent to which these are met, could not be applied as such, therefore tailored methods had to be developed. These methods and their applications are discussed. 相似文献
14.
We provide the complete record of methodology that let us evolve BrilliAnt, the winner of the Ant Wars contest. Ant Wars contestants are virtual ants collecting food on a grid board in the presence
of a competing ant. BrilliAnt has been evolved through a competitive one-population coevolution using genetic programming
and fitnessless selection. In this paper, we detail the evolutionary setup that lead to BrilliAnt’s emergence, assess its
direct and indirect human-competitiveness, and describe the behavioral patterns observed in its strategy.
相似文献
15.
The complexity of group dynamics occurring in small group interactions often hinders the performance of teams. The availability
of rich multimodal information about what is going on during the meeting makes it possible to explore the possibility of providing
support to dysfunctional teams from facilitation to training sessions addressing both the individuals and the group as a whole.
A necessary step in this direction is that of capturing and understanding group dynamics. In this paper, we discuss a particular
scenario, in which meeting participants receive multimedia feedback on their relational behaviour, as a first step towards
increasing self-awareness. We describe the background and the motivation for a coding scheme for annotating meeting recordings
partially inspired by the Bales’ Interaction Process Analysis. This coding scheme was aimed at identifying suitable observable
behavioural sequences. The study is complemented with an experimental investigation on the acceptability of such a service.
相似文献
16.
Listening to music on personal, digital devices whilst mobile is an enjoyable, everyday activity. We explore a scheme for
exploiting this practice to immerse listeners in navigation cues. Our prototype, ONTRACK, continuously adapts audio, modifying
the spatial balance and volume to lead listeners to their target destination. First we report on an initial lab-based evaluation
that demonstrated the approach’s efficacy: users were able to complete tasks within a reasonable time and their subjective
feedback was positive. Encouraged by these results we constructed a handheld prototype. Here, we discuss this implementation
and the results of field-trials. These indicate that even with a low-fidelity realisation of the concept, users can quite
effectively navigate complicated routes.
相似文献
17.
Nowadays data mining plays an important role in decision making. Since many organizations do not possess the in-house expertise
of data mining, it is beneficial to outsource data mining tasks to external service providers. However, most organizations
hesitate to do so due to the concern of loss of business intelligence and customer privacy. In this paper, we present a Bloom
filter based solution to enable organizations to outsource their tasks of mining association rules, at the same time, protect
their business intelligence and customer privacy. Our approach can achieve high precision in data mining by trading-off the
storage requirement.
This research was supported by the USA National Science Foundation Grants CCR-0310974 and IIS-0546027.
相似文献
18.
The genetic programming bibliography aims to be the most complete reference of papers on genetic programming. In addition
to locating publications, it contains coauthor and coeditor relationships which have not previously been studied. These reveal
some similarities and differences between our field and collaborative social networks in other scientific fields.
相似文献
19.
Awareness systems have attracted significant research interest for their potential to support interpersonal relationships.
Investigations of awareness systems for the domestic environment have suggested that such systems can help individuals stay
in touch with dear friends or family and provide affective benefits to their users. Our research provides empirical evidence
to refine and substantiate such suggestions. We report our experience with designing and evaluating the ASTRA awareness system,
for connecting households and mobile family members. We introduce the concept of connectedness and its measurement through
the Affective Benefits and Costs of communication questionnaire (ABC-Q). We inform results that testify the benefits of sharing
experiences at the moment they happen without interrupting potential receivers. Finally, we document the role that lightweight,
picture-based communication can play in the range of communication media available.
相似文献
20.
A number of mobile applications have emerged that allow users to locate one another. However, people have expressed concerns
about the privacy implications associated with this class of software, suggesting that broad adoption may only happen to the
extent that these concerns are adequately addressed. In this article, we report on our work on P eopleF inder, an application that enables cell phone and laptop users to selectively share their locations with others (e.g. friends,
family, and colleagues). The objective of our work has been to better understand people’s attitudes and behaviors towards
privacy as they interact with such an application, and to explore technologies that empower users to more effectively and
efficiently specify their privacy preferences (or “policies”). These technologies include user interfaces for specifying rules
and auditing disclosures, as well as machine learning techniques to refine user policies based on their feedback. We present
evaluations of these technologies in the context of one laboratory study and three field studies.
相似文献
|